Cursera Cryptography. Course Overview. Professor Dan Boneh

Материал готовится, пожалуйста, возвращайтесь позднее

Hello, my name is Dan Boneh, and I'd like to welcome you to my course on cryptography that I'll be teaching at Stanford University this quarter. This quarter, I'm experimenting with recording the lectures and having the students watch the lectures online. In fact, anyone is welcome to watch the lectures, and join the course. This is an experiment, so we'll see how it goes. My goals for this course are basically to teach you how cryptographic primitives work. But more importantly I'd like to teach you how to use cryptographic primitives correctly and reason about the security of your constructions. We will see various abstractions of cryptographic primitives,and we'll do some security proofs. My goal is by the end of the course you'll be able to reason about the security of cryptographic constructions and be able to break ones that are not secure. Now I'd like to say a few words on how I would like you to take the class. First of all,I'm a big believer in taking notes as you listen to the lectures. So I would really encourage you to summarize and take notes in your own words of the material that's being presented. Also I should mention that on the videos, I'm able to go much faster than I would go in a normal classroom. And so I would encourage you to periodically pause the video and think about the material that's being covered and not move forward until the material is clear in your mind. Also from time to time, the video will pause and app questions will come up. These are intended to kinda help you along with the material,and I would really encourage you to answer those questions by yourselves rather than skip them. Usually the questions are about the material that has just been covered,and so it shouldn't be too difficult to answer the questions. So I would really encourage you to do them rather than skip them. Now, by now I'm sure everybody taking the class knows that cryptography is used everywhere on computers are. It's a very common tool that's used to protect data. For example, web traffic is protected using a protocol called HTTPS. Wireless traffic. For example, wi-fi traffic is protected using the, WPA2 protocol, that's part of 801.11i. Cell phone traffic is protected using an encryption mechanism in GSM. Bluetooth traffic is protected using cryptography,and so on. We're gonna see how these various systems work. In fact, we're gonna cover SSL, and in fact, even 802.11i quite a bit of detail. And you'll see how these system work in practice. Cryptography's also used for protecing files that are stored on disc by encrypting them. So if the disc is stolen,the files are not compromised. It's also used for content protection. For example when you buy DVDs and Blu-Ray disks, the movies on these disks are encrypted, in particular DVD uses a system called CSS,the contents scrambling system, CSS. And Blu-Ray uses a system called AACS, we'll talk about how CSS and AACS work. It turns out that CSS is a fairly easy system to break. And we'll talk about how, we'll do some cryptanalysis and actually show how to break encryption that's used in CSS. Cryptography is also used for user authentication and in many, many, many other applications that we'll talk about in the next segment. Now I wanna go back to secure communication, and talk about the case where, here, we have a laptop trying to communicate with a web server.